|
advertisement |
|
|
|
|
|
|
Industrial Automatic Control Systems and Controllers Annotation << Back
The Methodic Bases of the Computing
Experiment Implementation of
the Information Security Study
from Leakage Through TEMPEST
Channels on the Informatizations
Special Purpose Object in Condition
of Effi ciency Checking Optimization of
Information Protection from Leakage |
S.V. Skryl’, A.V. Shcherbakov, V.I. Spivak, M.V. Ponomarev
The methodic of the computing experiment implementation using the mathematical models of the interception process features of the
informative signals from electromagnetic and electric fi elds, process of checking to effi ciency of protection to information and information
process in condition of interception threats and checking procedures realization is considered in the article. The purpose of the experiment
is to determine the best checking to effi ciency of protection to information parameters’ values with designed mathematical models and to get
scientifi cally reasonable requirements to directions of the improvement of checking procedures. The mathematical correctness of analytical
models of proofs of the realization timeliness factors of the checking to effi ciency of protection to information procedures, realization
timeliness of the information processes in condition of the interception threats of the electromagnetic and electric fi elds informative signal
and checking procedures realization, as well as security information from leakage on channel TEMPEST on special-purpose informatization
objects are given. The possibility of getting the scientifi cally reasonable requirements to directions of the checking procedures improvement
based on mathematical simulation results with use of designed analytical model of the timeliness factors of the checking to efficiency of protection to information procedures realization is illustrated.
Keywords: information leakage channel by means of TEMPEST; information protection effectiveness control from the leakage through
the channels of TEMPEST; procedures realization timeliness of checking to effi ciency of protection to information; information processes realization timeliness in condition of interception threats of the informative signal of electromagnetic and electric fl ap and checking procedures realization, information protection from the leakage through the channels of TEMPEST.
Contacts: E-mail: avs.76@mail.ru
Pp. 54-65. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |